My Journey Building a Cloud Server: A Student's Guide to AWS EC2 Quiz

Explore the essentials of launching, securing, and connecting to a virtual Linux server using cloud infrastructure. Learn how cloud computing simplifies server access, security, and management for students and beginners.

  1. Selecting a Virtual Machine in the Cloud

    What is one benefit of launching a virtual server in the cloud instead of buying a physical server for website hosting?

    1. You need to install physical memory chips
    2. You pay only for the computing resources you use
    3. You must handle hardware repairs yourself
    4. You can only access it from a local network

    Explanation: Cloud servers offer flexibility by charging based on actual usage instead of requiring upfront hardware investment. Unlike physical servers, hardware maintenance is managed by the cloud provider, and cloud servers can be accessed from anywhere with internet connectivity. Installing physical memory chips is not needed since the hardware is virtualized.

  2. Understanding SSH Key Pairs

    Why is it important to keep your private SSH key secure when managing a cloud server?

    1. It is used to browse the internet anonymously
    2. The private key changes passwords automatically
    3. Anyone with the private key can access your server
    4. It is needed to pay your subscription bill

    Explanation: Possession of the private SSH key grants remote access to your server, making its security vital. It is not related to billing, does not automate password changes, and is not a tool for anonymous internet browsing. Its main function is serving as a secure login method.

  3. Connecting to a Cloud Server Remotely

    When connecting to a Linux virtual server using SSH, what information do you typically need?

    1. Server room location and operating system manual
    2. Physical monitor connected to the server
    3. USB drive with configuration files
    4. Username, server public IP address, and private SSH key

    Explanation: Remote SSH connections require the username, public IP address of the server, and the private SSH key for authentication. Physical location, USB drives, and monitors are unnecessary for cloud-based server access because all interaction happens over the network using secure keys.

  4. Firewall and Security Groups

    What is the function of a security group (cloud firewall) in managing a cloud server?

    1. It controls which network traffic can reach the server
    2. It monitors keyboard activity on the server
    3. It changes the operating system automatically
    4. It backs up server data every hour

    Explanation: Security groups or firewalls are designed to allow or block specific types of network traffic to and from the server. They do not monitor keystrokes, change system software, or perform backups; their main role is network access control.

  5. Opening Ports for Remote Desktop and Web Hosting

    Which network port must typically be open on your server's firewall to allow HTTP web traffic?

    1. 53
    2. 80
    3. 3389
    4. 22

    Explanation: Port 80 is the standard port for HTTP web traffic, allowing users to browse websites. Port 22 is used for SSH, 3389 for remote desktop (RDP), and 53 for DNS services, none of which are intended for standard web hosting.